학술논문

Dynamic Swarm Attestation With Malicious Devices Identification
Document Type
article
Source
IEEE Access, Vol 6, Pp 50003-50013 (2018)
Subject
Attestation
swarms
malicious node
security
efficiency
dynamic topology
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Language
English
ISSN
2169-3536
Abstract
Nowadays, there is a rapid development of smart sensor network solutions. To prevent potential malicious attacks and make sure that the activities of devices are correct, there is a pressing need to ensure the software integrity of devices in the large-scale, dynamic, and self-organization swarm. Different from those single device attestation studies, Asokan et al. are the first to consider the secure swarm attestation problem and provide implementations based on two remote attestation architectures for embedded systems. However, their scheme could not provide a correct attestation result with dynamic swarm topology. Also, their scheme could not prevent a malicious device from launching a new attestation, and the adversary can use this weakness to conduct energy exhausting attack. In this paper, we mainly focus on secure and efficient identity attestation of compromised devices over swarm with dynamic topology and design an interactive swarm attestation scheme. Furthermore, we introduce multi-hop attestation security in swarm attestation and provide a verifiable solution for new attestation launching solution based on the one-way hash chain. Moreover, theoretical and practical analyses prove that our scheme is secure and efficient in attestation security and energy saving for dynamic swarm topology.